Completed
Lock Puzzles and Verifiable Delay Functions
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cryptocurrency
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Attacking Threshold Wallets
- 3 Threshold signature schemes TSST
- 4 Forget & Forgive Setup
- 5 Golden Shoe Setup
- 6 Golden Shoe Vulnerability
- 7 Golden Shoe Exploit
- 8 Golden Shoe Mitigation
- 9 Takeaways
- 10 From Crypto-Paper to Crypto-Currency: the Cardano Consensus Layer
- 11 Overview
- 12 Distributed Computation over a Netwo
- 13 Consensus Layer of Cardano
- 14 Theory + Practice Interplay
- 15 Connecting theory with implementation
- 16 Block-Fetch, Forecasting, Denial of Service
- 17 What are Randomness Beacons?
- 18 Important Beacon Parameters
- 19 Constructions: Verifiable Random Functic (VRF)
- 20 Constructions: Threshold VRFs
- 21 Lock Puzzles and Verifiable Delay Functions